- Chief Compliance Officer and VP of Legal Affairs, Arrow Electronics
By Jaclyn Jaeger2020-02-10T19:21:00
The DOJ announced four members of the Chinese military have been indicted on charges of hacking into the computer systems of Equifax, ultimately resulting in the largest-ever breach of consumer data. From an ERM standpoint, the indictment offers an inside look at the making of a Chinese cyber-attack.
You are not logged in and do not have access to members-only content.
If you are already a registered user or a member, SIGN IN now.
2020-01-21T19:40:00Z By Jaclyn Jaeger
A massive data breach that was “entirely preventable” will cost credit-reporting agency Equifax another $1 billion to beef up its cyber-security efforts.
2019-07-22T19:45:00Z By Jaclyn Jaeger
What resulted in the largest-ever breach of consumer data culminated in the largest data breach enforcement action in history.
2018-11-30T14:15:00Z By Joe Mont
A breach of the Marriott hotel chain’s guest reservation database may have compromised the personal information of upwards of 500,000 customers. The reveal follows an unrelated breach that affected members of Dunkin’ Donuts loyalty card program.
2025-04-08T16:47:00Z By Aaron Nicodemus
The U.K. government wants directors and boards of directors to become more actively involved in cybersecurity risks facing public and private companies, as the world faces “alarming” threats from criminal gangs and malicious nation-states. Though many organizations take cybersecurity seriously, the U.K. government says they do not place management of ...
2025-03-28T14:22:00Z By Thomas Graham, CW guest columnist
Many small organizations within the Defense Industrial Base are struggling to meet the rigorous requirements validated through the Cybersecurity Maturity Model Certification, writes Thomas Graham, CISO at Redspin. If you haven’t been tracking it closely, CMMC was finalized in October, with an effective date of December 16, 2024.
2025-02-10T15:27:00Z By Rezaul Karim, CW guest columnist
The dark web has been depicted as a long-standing hub for crimes, where illegal activities such as drug dealing, financial fraud, weapon sales, murder for hire, stolen credit cards, and ransomware gags are easily accessible to the public.
Site powered by Webvision Cloud